Suggestion

Cloak secures everything you do from your laptop or iOS by setting up something called a Virtual Private Network (VPN). The best part is that you don't have to know anything about VPNs to use Cloak.

You can use as many devices as you like on a single Cloak account, even multiple devices at the same time. They ask only that you keep your account limited to you and don’t share it with other people – each user should have their own account.

Related Content

This post was one of a series of five that discussed different aspects of digital security. It was based on content from a presentation at the 2014 SAF Annual Convention and posted in the wake of the recent celebrity photo hacking scandal in September after I heard from some people asking for more information. Other entries in the series appear below.

We increasingly rely on our digital devices but that data is fragile. It can be lost instantly if the machine is stolen or damaged (fire, water, etc.) suffers mechanical failure or is infected by viruses or malware.